Wednesday, November 16, 2011

6.1 Web 2.0

In this chapter we learned how a company can utilize web 2.0 to help a company. The pillars of web 2.0 are: utilizing the web as a platform, harnessing collective intelligence, levering data, and implementing innovative web capabilities. Utilizing the web as the platform is to keep everyone on the same level. This encourages peer-to-peer technology which increases the sites down load speed this can be helpful to our company. Harnessing collective intelligence will give us the ability to understand our customers better and they will feel like part of the company in a way. Levering data is to get data on our customers by where they go on our site so we can more carefully cater our advertising g toward them. Also implementing innovative web technologies is how we will constantly monitor and upgrade our system. This will help us maintain our company profile.

7.1

In this Unit we discussed security features for computers. This diagram represents how encryption works. The first step in encrypting a message is that the sender creates a document to be sent to the receiver. The next step is the sender uses the receiver's public key to encrypt a message. The next step in the process is that the receiver uses his/her private key to decrypt the message. Lastly the receiver can read and/or print the decrypted message. All in all our company could use this system to send messages to each other with less threat of outside intrusion. (Part B)

(Part A): As a puppy daycare we have to be aware of possible threats to our security. One possible threat would be that we have a lot of dogs running around and one could possibly run over a open computer while its user was distracted and delete all our data. To solve this threat I suggest we implement a backup system somewhere that's not at the puppy daycare. Another threat that could happen to our computer system would be our employees increasing their salaries intentionally. We will solve this problem by having the employees limited on their user accounts. Another possible threat would be someone hacking their way into our system and stealing our customers credit card information. To solve this problem we will put up several firewalls and a auto detection system if some unknown source is hacking into our system. Another possible threat could be the possablity of viruses getting into our system. Another possible threat that could possibly concern us is the likely hood of a natural disaster. We should back it up on a off site server location.

Monday, October 24, 2011

5.2 B2b Electronic Commerce

We use the internet in our company so that other companies that help us work can communicate and work with us. We need to do this in the most secure way possible. So we have them log in through our VPN so we can access each others servers on a secure private network.

5.1 Critique Your Competitor's E-Commerce Website

Me and my group choose to rate a competitor's website: www.puppydaycare.com
1. Website should offer something unique- 2/5 (cute puppy photos)
2. Website should be aesthetically pleasing- 1/5 (very boring not much to look at)
3 Website should be easy to use and fast- 2/5 (pages load quickly but hard to find what you need)
4.Website should motivate people to come back- 1/5 (i wasn't motivated at all the place they have looked dirty)
5.Website should advertise online- 1/5 (hard to find)
6.Website should give the ability to be learned form- 1/5 (Nothing for them to learn form most likely)

4.4 Entity Relationship Diagram

This diagram represents a Version of a entity relationship diagram. It shows this through Invoice that has such features as customers key, product code, date, etc.
We also see the Customer section on this Entity relationship diagram. Customers are instrumental to a company's success so this particular company focused in on inserting their customers basic info into their system.
Which we can then relate customer to product by seeing what that particular customer purchased in the past giving that company the ability to relate through a type of key system.

Friday, September 30, 2011

4.2 - Packet Switching Technology












This image is a example of packet switching technology. To make this technology run correctly you first need a router to send requests and receive information. SO the client requests information from a server then that information is directed back towards the users IP address. The IP datagram is needed for servers to send the requested data in packets along a concurrent data transmission. The TCP must organize and check and make sure the information is correct and all together. Then the IP sends the information in using packet-switching technology.

Monday, September 26, 2011

4.1 IFS H/W Infrastructure

In this diagram we can see that someone is using the input technology of a keyboard and mouse to type in the word HELLO. This word is then sent through processing technologies to be transformed into machine language according to the ASCII code. This information is put into the CPU where the control unit schedules it for delivery to the designated area. This information is binary code which is made up of bits and bytes. The ALU component of the CPU takes over to make the correct calculations in decoding this particular message. Then this information shows up at the receiver using whatever there particular output technology would be. This whole flow is thanks to the system unit which is what this entire process is.